XSS Exploitation
Exe 1: DOM XSS in document.write sink using source location.search Enter a random alphanumeric string into the search box. Right-click and inspect the element, and observe that your random string has been placed inside an img src attribute. Break out of the img attribute by searching for: "><svg onload=alert(1)> Payload: "><svg onload=alert(1)> Exe 2: DOM XSS in innerHTML sink using source location.search Enter the following into the into the search box: <img src=1 onerror=alert(1)> Click ...